Claim Missing Document
Check
Articles

Found 6 Documents
Search

IMPLEMENTASI HILL CIPHER PADA CITRA MENGGUNAKAN KOEFISIEN BINOMIAL SEBAGAI MATRIKS KUNCI Supiyanto, Supiyanto
Seminar Nasional Informatika (SEMNASIF) Vol 1, No 1 (2015): Informatika Dalam Pengelolaan Sumber Daya Alam
Publisher : Jurusan Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Hill cipher merupakan sebuah teknik kriptografi klasik, yang menggunakan matriks sebagai kunci dalam proses meng-enkripsi dan men-dekrispsi pesan dengan tipe kunci yang digunakan adalah tipe kunci simetris. Hal ini menjadi keunggulan dalam algoritma hill cipher tapi kekurangannya, tidak semua matriks kunci yang digunakan untuk mengenkripsi plaintext mempunyai invers. Menggunakan matriks kunci yang tidak mempunyai invers, akan menyebabkan pesan hasil enkripsi tidak bisa didekripsi untuk menjadi pesan asli kembali. Tujuan dari penelitian ini adalah untuk mengatasi kekurangan dari algoritma Hill Cipher yakni menentukan matrik kunci yang dijamin mempunyai invers atau dapat dibalik. Dan pada penelitian ini menggunakan Koefisien-koefesien Binomial Newton sebagai entri-entri dari matriks kunci. hasil penelitian ini berupa program aplikasi yang dapat digunakan untuk mengenkripsi dan mendekripsi gambar menggunakan algoritma Hill Cipher dengan matriks kunci yang selalu mempunyai invers karena determinant dari matriks kunci ini sama dengan satu. Penyandian citra dengan Hill Cipher menunjukkan keteracakan warna yang cukup signifikan, hal ini menunjukkan bahwa proses enkripsi berhasil dengan baik.
PENGENALAN CITRA WAJAH MANUSIA DENGAN MENGGUNAKAN METODE EIGENFACE supiyanto, Supiyanto; suparwati, Titik
MATEMATIKA Vol 12, No 2 (2009): JURNAL MATEMATIKA
Publisher : MATEMATIKA

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (6.732 KB)

Abstract

Face applicable to identify the somebody identity for security. Intention of this research is study the face recognition by using eigenface method and make the application program which can be used to recognize the face in so many expression, position as well as face experienced of the trouble  effect  existence of noise. In Eigenface method, decoding is done by calculating eigenvector then represented in a large matrix. Eigenvector is also declared as facial characteristics, therefore why this method is called with Eigenface. Face input which at this application is in the form of face image of the size and same resolution. Output Application is in the form of class closest from face which wish recognized. This application made with the program delphi 7 which enough rely on and easy to in calculation mathematic. Result of examination of face recognition by using approach eigenface to used sampel, program can recognize the face truly with the efficacy 88,2%.  
PERBAIKAN CITRA MENGGUNAKAN METODE CONTRAST STRETCHING Supiyanto Supiyanto; Titik Suparwati
Jurnal Siger Matematika Vol 2, No 1 (2021): Jurnal Siger Matematika
Publisher : FMIPA Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (512.95 KB) | DOI: 10.23960/jsm.v2i1.2743

Abstract

Contrasting images that are not good because they are too bright or too dark cannot provide good information. Therefore, a method is needed to improve the image quality, so that the information in the image can be conveyed properly. Contrast stretching is one of the methods for improving image quality. With this method is expected to produce a new image that is better. The purpose of this research is to apply contrast stretching method to an application or software that can be used to improve image quality. Data used in this study in the form of grayscale image data and RGB imagery (true color), with the format . BMP or .JPG, while the application development uses the Matlab programming language.The results of the study, contrast stretching method can be used to repair image that affects bad or poor image quality such as too bright / dark image, less sharp image, blurry, and so on. Contrast stretching method can also be used to improve image enhancement by leveling the histogram that was collected in an area, so that the information contained in the image is more clearly visible compared to the original image.
Text Data Security Using Stream Cipher Algorithm S Supiyanto; Agung Dwi Saputro; Muhammad Asghar
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.278

Abstract

The Stream Cipher cryptographic algorithm is a cryptographic algorithm that can be used to secure symmetric key-type data. The Stream Cipher algorithm uses the same key when performing encryption and decryption. In carrying out the encryption process, the Stream Cipher algorithm uses the stream cipher method, where the cipher comes from the result of an XOR operation between the plaintext bit and the key bit. This study aims to implement the Stream Cipher algorithm with a Matlab programming language for text security. The text data used in this study is in the form of a file with a txt extension. The stages of research methods included literature studies, algorithm analysis, program design, and testing. The method used in this study is to apply the Stream Cipher algorithm to a programming language to produce an application that can be used for data security. The output of this research is the creation of an application program that can be used to secure text data so that the information contained is not easily stolen or misused by irresponsible people. The test results in the study using a key that was modulo-kan 65 first will produce a random message in the form of clear characters while using a key that is not modulated will produce a random message that is less clear in the form of boxes.
Text Data Security Using Stream Cipher Algorithm S Supiyanto; Agung Dwi Saputro; Muhammad Asghar
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.278

Abstract

The Stream Cipher cryptographic algorithm is a cryptographic algorithm that can be used to secure symmetric key-type data. The Stream Cipher algorithm uses the same key when performing encryption and decryption. In carrying out the encryption process, the Stream Cipher algorithm uses the stream cipher method, where the cipher comes from the result of an XOR operation between the plaintext bit and the key bit. This study aims to implement the Stream Cipher algorithm with a Matlab programming language for text security. The text data used in this study is in the form of a file with a txt extension. The stages of research methods included literature studies, algorithm analysis, program design, and testing. The method used in this study is to apply the Stream Cipher algorithm to a programming language to produce an application that can be used for data security. The output of this research is the creation of an application program that can be used to secure text data so that the information contained is not easily stolen or misused by irresponsible people. The test results in the study using a key that was modulo-kan 65 first will produce a random message in the form of clear characters while using a key that is not modulated will produce a random message that is less clear in the form of boxes.
PELATIHAN PENERAPAN TEKNOLOGI IOT PENYIRAMAN OTOMATIS TANAMAN BUNGA DI KELURAHAN HEDAM JAYAPURA Mingsep Sampebua; Jonathan Wororomi; Supiyanto Supiyanto; Remuz Kmurawak; Yokelin Tokoro
Community Development Journal : Jurnal Pengabdian Masyarakat Vol. 5 No. 1 (2024): Volume 5 No 1 Tahun 2024
Publisher : Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/cdj.v5i1.25246

Abstract

Keberadaan tanaman bunga di setiap rumah dapat membuat suasana tenang, sehat, sejuk, dan segar. Kurangnya tanaman bunga yang tumbuh di setiap rumah di Kelurahan Hedam diakibatkan oleh beberapa hal antara lain tanaman bunga tidak dirawat dengan baik khususnya pada musim kemarau. Hal ini terjadi karena penyiraman tanaman bunga hanya dilakukan pada saat ada waktu luang, berbagai kesibukan ibu-ibu yang menyebabkan bunga menjadi layu, kering, dan mati. Tujuan kegiatan pengabdian PNBP Universitas Cenderawasih ini adalah memberikan pelatihan dan praktek kepada ibu-ibu di RT. 02 RW. 04 kelurahan Hedam untuk menerapkan sistem penyiraman otomatis tanaman bunga berbasis teknologi Internet of Things (IoT). Metode kegiatan pengabdian yaitu ceramah, diskusi, tanya jawab, praktek, dan evaluasi penggunaan sistem penyiraman otomatis tanaman bunga. Hasil kegiatan pengabdian adalah mitra memiliki pengetahuan dan keterampilan tentang teknologi IoT pada sistem penyiraman otomatis tanaman bunga. Pelatihan sistem penyiraman tanaman otomatis membantu ibu-ibu di Kelurahan Hedam dalam merawat tanaman bunga agar tidak layu atau mati karena kekurangan air dan penyiraman tanaman dilakukan secara realtime sesuai dengan kebutuhan air berdasarkan kondisi kelembaman tanah.